Başlık için Bildiri Koleksiyonu listeleme
Toplam kayıt 113, listelenen: 87-106
-
Privacy-Preserving Kriging Interpolation on Distributed Data
(Springer-Verlag Berlin, 2014)Kriging is one of the most preferred geostatistical methods in many engineering fields. Basically, it creates a model using statistical properties of all measured points in the region, where a prediction value is sought. ... -
Privacy-preserving kriging interpolation on distributed data
(Springer Verlag, 2014)Kriging is one of the most preferred geostatistical methods in many engineering fields. Basically, it creates a model using statistical properties of all measured points in the region, where a prediction value is sought. ... -
Privacy-Preserving Trust-based Recommendations on Vertically Distributed Data
(IEEE Computer Soc, 2011)Providing recommendations on trusts between entities is receiving increasing attention lately. Customers may prefer different online vendors for shopping. Thus, their preferences about various products might be distributed ... -
Providing naive Bayesian classifier-based private recommendations on partitioned data
(Springer-Verlag Berlin, 2007)Data collected for collaborative filtering (CF) purposes might be split between various parties. Integrating such data is helpful for both e-companies and customers due to mutual advantageous. However, due to privacy ... -
Providing naïve Bayesian classifier-based private recommendations on partitioned data
(2007)Data collected for collaborative filtering (CF) purposes might be split between various parties. Integrating such data is helpful for both e-companies and customers due to mutual advantageous. However, due to privacy ... -
Providing Private Recommendations on Personal Social Networks
(Springer-Verlag Berlin, 2010)Personal social networks are recently used to offer recommendations. Due to privacy concerns, privacy protection while generating accurate referrals is imperative. Since accuracy and privacy are conflicting goals, providing ... -
Providing private recommendations using naive Bayesian classifier
(Springer-Verlag Berlin, 2007)Today's CF systems fail to protect users' privacy. Without privacy protection, it becomes a challenge to collect sufficient and high quality data for CF. With privacy protection, users feel comfortable to provide more ... -
Quality benchmarking relational databases and Lucene in the TREC4 adhoc task environment
(2010)The present work covers a comparison of the text retrieval qualities of open source relational databases and Lucene, which is a full text search engine library, over English documents. TREC-4 adhoc task is completed to ... -
Quantification of Projective Distortion for Fiducial Markers
(IEEE, 2013)The aim of this study is to quantify the projective distortion of candidate quadrilaterals found in a square-framed fiducial marker detection algorithm. Based on the quantified value, candidates can be eliminated in such ... -
Quantification of projective distortion for fiducial markers [Duzlemsel dsaretciler dcin dzdusumsel carpikligin nicelendirilmesi]
(2013)The aim of this study is to quantify the projective distortion of candidate quadrilaterals found in a square-framed fiducial marker detection algorithm. Based on the quantified value, candidates can be eliminated in such ... -
Randomization-based Privacy-preserving Frameworks for Collaborative Filtering
(Elsevier Science BV, 2016)Randomization-based privacy protection methods are widely used in collaborative filtering systems to achieve individual privacy. The basic idea behind randomization utilized in collaborative filtering schemes is to add ... -
Real-time Edge Segment Detection with Edge Drawing Algorithm
(IEEE, 2011)Edge Drawing (ED) is an edge detection method that works by computing a set of anchor points, which are most likely to be edge elements, and linking them with a predefined set of rules which we call smart routing. ED can ... -
Realtime circular object detection based on the statistical compactness estimation [İstati·sti·ksel tikizlik kesti·ri·mi·ne dayali gerçek zamanli dai·resel nesne tespi·ti·]
(2012)Gathering statistical and geometrical information by processing the shape contours is the common way of feature extraction on object detection and recognition studies. Compactness is an important shape descriptor which ... -
A Robust Css Corner Detector Based on the Turning Angle Curvature of Image Gradients
(IEEE, 2013)In this study, we present a new contour-based corner detection method based on the turning angle curvature computed from the contour gradients of the image. In general, curvature is computed with the pixel locations of the ... -
A robust CSS corner detector based on the turning angle curvature of image gradients
(2013)In this study, we present a new contour-based corner detection method based on the turning angle curvature computed from the contour gradients of the image. In general, curvature is computed with the pixel locations of the ... -
A Robust Multi-Criteria Collaborative Filtering Algorithm
(IEEE, 2018)Collaborative filtering recommender systems assist individuals to discover relevant products or services that they might be interested in a large set of alternatives by analyzing the collected preferences. Recent research ... -
Robustness Analysis of Naive Bayesian Classifier-Based Collaborative Filtering
(Springer-Verlag Berlin, 2013)In this study, binary forms of previously defined basic shilling attack models are proposed and the robustness of naive Bayesian classifier-based collaborative filtering algorithm is examined. Real data-based experiments ... -
Sentiment classification: Feature selection based approaches versus deep learning
(IEEE, 2017)Classification of text documents is commonly carried out using various models of bag-of-words that are generated using feature selection methods. In these models, selected features are used as input to well-known classifiers ... -
Similar or Dissimilar Users? Or Both?
(IEEE Computer Soc, 2009)E-commerce sites utilize collaborative filtering (CF) techniques to offer recommendations to their customers. To recruit new customers and keep the current ones, it is imperative for online vendors to provide accurate ... -
A Survey on RF Mapping for Indoor Positioning
(IEEE, 2015)In RF based indoor positioning systems, RF map is constructed by collecting Received Signal Strength (RSS) values from access points at predetermined reference points in the working area. RF map is calibrated in order to ...